Blog
Stay Up to Date with Industry News

If Your ECM is Crashing, It’s Screaming for an Upgrade
Does your Enterprise Content Management (ECM) system crash at the worst possible times? Maybe it’s struggling to handle the load during peak business hours, or perhaps it freezes when you try to retrieve large files. Either way, a crashing ECM is a clear sign that...

The User-Friendly ECM: Simplifying Document Access for Busy Teams
If finding the right document feels like searching for a needle in a haystack, your team’s productivity is taking a serious hit. Wasting time on file searches, getting lost in a maze of folders, or dealing with version control issues not only slows teams down but also...
Microsoft Power Pages
Microsoft Power Pages is a low-code, scalable, and secure solution, which empowers low-code maker or professional developers to build business-centric websites quickly and easily. Power Pages extends far beyond portals former capabilities to enable organizations of...
10 Types of Cyber Security Threats
1. SQL Injection:Injecting malicious SQL code into the entry field for hacking database-driven websites or websites that use dynamic SQL. 2. Malware attacks:Hackers install malicious software on the victim’s system without consent in this cyberattack. 3. Phishing and...
OpenText AppWorks Cloud Updates
The latest announcement about OpenText of Cloud Editions includes some great updates to OpenText™ AppWorks. Cloud Edition (CE) 22.1: Modern approach to integration is provided by new REST APIs for integrating AppWorks’ task management and business...
OpenText EnCase Endpoint Security
OpenText EnCase Endpoint Security provides security teams with a comprehensive view to validate, analyze and respond to incidents quickly and completely. 360-degree endpoint visibility Get in-depth visibility into forensic artifacts on endpoints throughout the...
OpenText Extended ECM Documentum for Salesforce
OpenText Extended ECM Documentum for Salesforce storing and managing business-critical content into the Salesforce platform. Enterprise-grade content governance and lifecycle management can now be introduced to content within the world's leading CRM system. Run in...
Reasons to Upgrade from Webtop to Documentum D2
OpenText Documentum D2 is the next generation interface for accessing and interacting with content stored on a Documentum server. Here are 10 reasons why to Upgrade from Webtop to Documentum D2: 1. Roadmap When comparing roadmaps for Webtop and D2, users can clearly...
OpenText Documentum eRoom
eRoom is an on-line project collaboration, or collaborative software product from Opentext Corporation. The solution helps create efficiency in daily tasks, also allows users to seamlessly collaborate on projects, programs and processes to eliminate the gaps that put...
Benefits of Electronic Data Interchange
Electronic Data Interchange is a standard electronic format that replaces paper-based documents such as purchase orders or invoices. By automating paper-based transactions, organizations can save time and eliminate costly errors caused by manual processing.In EDI...
Secure Employee Behavior Is Equally as Important as Secure Technology
Considering that we use technology all day long in our personal lives and at work, it makes sense that cybercrime is on everyone’s mind. A prominent data Breach Investigation Report reported a record total of 157,525 incidents in categories that ranged from malware to...
Microsoft’s breakthrough – Image Captioning using Azure Cognitive Services
Microsoft professionals have built an artificial intelligence system that can generate captions for images that are, in many cases, more accurate than the descriptions people write.Automatic image captioning helps all users access the important content in any image,...
Box Adds New Feature – Box Canvas
Box announced a new product, which is Box Canvas! Box Canvas is visual collaboration and whiteboarding, integrated in the Box Content Cloud. Box Canvas gives Users plenty of possibilities to create, using visual formats, host interactive workshops or meetings securely...
How to Spot Basic Hacking Attack Methods
Hackers gain access to their targets in a variety of ways. The below list of entry point methods are common techniques that cybercriminals use to prey on our human behaviors and gain access to sensitive information or networks. Phishing: Attempting to acquire...
Malware Deep Scan Capability in Box Shield
Box Shield - the Box’s flagship security control and intelligent threat detection solution, has capability to help customers reduce the risk of ransomware by scanning files in near real-time as they are uploaded to Box. These new capabilities, leverage deep learning...
ECM is key for document control
It’s estimated that the average company faces 800 hours of downtime each year. With an hour of downtime costing as much as $540,000, inefficiencies and delays in maintenance activities can be very damaging. Having the correct information there when...